T:\tvduArzE\uvqksGQa\vBpQmnvIQjgM\wpbXrvujWeo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118
-
Size
219KB
-
MD5
ea93035d6b00148b21b5b1f64f2db9ac
-
SHA1
45852452126a743a0ad2f49b224618f8fe044eff
-
SHA256
c23b564b7a2e2991d9268a2aea47f1f8a74deced10d70bfe38077d10793bf8eb
-
SHA512
6c9f21481368c25e34efac4fd08818dcce99990a83f324ba6731e3cd28a69352989f6da9b3a5ffedc77e348ff21df5b4a9641f812709fcde092920dedb12b8c9
-
SSDEEP
6144:Rm2OXHGn0zttJzx0bk+n2R5NoubeP6PFj52uZ1+4PgKD:RcXmat/AznY5Nc6CuZJPga
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118
Files
-
ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118.exe windows:5 windows x86 arch:x86
cb4317393f5bdadcc3c57eadf8219396
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerFindFileW
comctl32
ImageList_Remove
ImageList_GetIconSize
PropertySheetW
CreatePropertySheetPageW
user32
SendMessageA
GetMenuStringW
GetMenuStringA
GetAltTabInfoW
GetMonitorInfoW
RegisterClassW
CreateDialogParamW
CharToOemBuffA
CharUpperBuffW
InflateRect
GetDialogBaseUnits
GetMenuCheckMarkDimensions
ShowScrollBar
CreatePopupMenu
DialogBoxParamA
MapVirtualKeyW
GetDlgCtrlID
VkKeyScanW
LoadAcceleratorsW
keybd_event
RemoveMenu
SendMessageTimeoutA
GetSysColor
EndPaint
CharNextExA
CallMsgFilterW
GetScrollRange
GetSubMenu
IsCharAlphaA
CopyRect
AppendMenuW
GetIconInfo
SetWindowLongW
SetDlgItemInt
DefWindowProcW
MessageBoxExA
WaitForInputIdle
advapi32
SetSecurityDescriptorOwner
msvcrt
memcpy
kernel32
GlobalUnlock
SetFileAttributesW
GlobalFindAtomW
SetMailslotInfo
GlobalReAlloc
GetTickCount
CreateWaitableTimerA
lstrcpyW
CreateRemoteThread
GetLocaleInfoA
SetTimerQueueTimer
GetComputerNameW
EnterCriticalSection
GetComputerNameExW
lstrlenW
ClearCommBreak
SetThreadAffinityMask
GetDateFormatW
CloseHandle
gdi32
EndDoc
Escape
StretchDIBits
OffsetViewportOrgEx
RemoveFontResourceW
StartDocW
GetNearestColor
IntersectClipRect
SetViewportOrgEx
TextOutA
SetDIBits
CreateRectRgn
TextOutW
SetBitmapDimensionEx
SetBrushOrgEx
SetBkMode
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 512B - Virtual size: 410B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xdiag Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ydiag Size: 512B - Virtual size: 74B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ